Sciweavers

726 search results - page 17 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
CN
2007
137views more  CN 2007»
13 years 7 months ago
A survey on ultra wide band medium access control schemes
Ultra wideband (UWB) technology based primarily on the impulse radio paradigm has a huge potential for revolutionizing the world of digital communications especially wireless comm...
Ashima Gupta, Prasant Mohapatra
SACMAT
2004
ACM
14 years 27 days ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
CCR
1999
56views more  CCR 1999»
13 years 7 months ago
MPEG transmission schemes for a timed token medium access control network
This paper presents three transmission schemes to improve the transmission of MPEG video over a timed token medium access control (MAC) network. Multiple classes of MPEG video are...
Joseph Kee-Yin Ng
COMGEO
2010
ACM
13 years 10 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu